The technical analysis used in determining which of the NESSIE candidates will be selected as a standard block cipher includes efficiency testing of both hardware and software implementations of candidate algorithms. Reprogrammable devices such as Field Programmable Gate Arrays (FPGA’s) are highly attractive options for hardware implementations of encryption algorithms and this report investigates the significance of FPGA implementations of the block ciphers KHAZAD and MISTY1. A strong focus is placed on high throughput circuits and we propose designs that unroll the cipher rounds and pipeline them in order to optimize the frequency and throughput results. In addition, we implemented solutions that allow to change the plaintext and the key on a cycle-by-cycle basis with no dead cycle. The resulting designs fit on a VIRTEX1000 FPGA and have throughput between 8 and 9 Gbits/s. This is an impressive result compared with existing FPGA implementations of block ciphers within similar devices.
[1]
Vincent Rijmen,et al.
The KHAZAD Legacy-Level Block Cipher
,
2001
.
[2]
Mitsuru Matsui,et al.
New Block Encryption Algorithm MISTY
,
1997,
FSE.
[3]
Kris Gaj,et al.
Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware
,
2000,
AES Candidate Conference.
[4]
Christof Paar,et al.
An FPGA Implementation and Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists
,
2000,
AES Candidate Conference.
[5]
Máire O'Neill,et al.
High Performance Single-Chip FPGA Rijndael Algorithm Implementations
,
2001,
CHES.